Upload
meljun-cortes
View
447
Download
1
Embed Size (px)
DESCRIPTION
MELJUN CORTES Cyber Ethics
Citation preview
ISAT 615ISAT 615 11
ISAT 615ISAT 615
Cyber EthicsCyber Ethics
ByBy
Drs. Alkadi & AcostaDrs. Alkadi & Acosta
ISAT 615 2
Cyber EthicsCyber Ethics
The majority of the slides were taken from The majority of the slides were taken from the book, “Cyber Ethics” by Halbert Ingulli, the book, “Cyber Ethics” by Halbert Ingulli, which is referenced later.which is referenced later.
For more information, go to:For more information, go to:
http://halbert.westbuslaw.comhttp://halbert.westbuslaw.com
ISAT 615 3
Intellectual Property & CyberspaceIntellectual Property & Cyberspace
If seven million people are stealing, they aren’t stealing.If seven million people are stealing, they aren’t stealing.David Post, Prof. of law, Temple Univ.David Post, Prof. of law, Temple Univ.
Today’s Internet pirates try to hide behind some contrived Today’s Internet pirates try to hide behind some contrived New Age arguments of cyberspace, but all they are really New Age arguments of cyberspace, but all they are really doing is trying to make a case for Age Old Thievery. When doing is trying to make a case for Age Old Thievery. When they hack a DVD and then distribute it on the web, it is no they hack a DVD and then distribute it on the web, it is no different that if someone puts a quarter in a newspaper different that if someone puts a quarter in a newspaper machine and then takes out all the papers, which of course machine and then takes out all the papers, which of course would be illegal and morally wrong.would be illegal and morally wrong.
Michael Eisner, Chairman & CEO, The Walt Disney CompanyMichael Eisner, Chairman & CEO, The Walt Disney Company
ISAT 615 4
Ethics Case: NapsterEthics Case: Napster Is it ethical to listen to as many times as you want a song that you Is it ethical to listen to as many times as you want a song that you
didn’t buy?didn’t buy? You will probably send it to a dozen of your closest fiends and You will probably send it to a dozen of your closest fiends and
relatives.relatives. Napster operates on a (P2P) computing model. Users who have Napster operates on a (P2P) computing model. Users who have
downloaded the free S/W from its site can then access the directory of downloaded the free S/W from its site can then access the directory of available music and add tunes of their own. Napster’s server is an available music and add tunes of their own. Napster’s server is an intermediary, allowing one user to reach the files of another.intermediary, allowing one user to reach the files of another.
In other words, you are able to broadcast your request to millions of In other words, you are able to broadcast your request to millions of other music lovers in the Napster’s community.other music lovers in the Napster’s community.
Does anyone else have this CD on their PC, are they online?Does anyone else have this CD on their PC, are they online? What happened to Napster?What happened to Napster?
http://archives.cnn.com/2001/LAW/02/20/napster.settlement.03/http://archives.cnn.com/2001/LAW/02/20/napster.settlement.03/
ISAT 615 5
Intellectual Property LawIntellectual Property Law
Our legal system has developed ways of protecting intellectual Our legal system has developed ways of protecting intellectual property.property.
Congress passed copyrights, patent and trademark laws.Congress passed copyrights, patent and trademark laws. What is protected is the expression of an idea, not the idea itself.What is protected is the expression of an idea, not the idea itself. This follows from the high value we place on freedom of speech and This follows from the high value we place on freedom of speech and
expression.expression. Copyright law protects the tangible expression of an idea from being Copyright law protects the tangible expression of an idea from being
reproduced without the permission of the copyright holder.reproduced without the permission of the copyright holder. A copyrighted work of art must be original, and created independently A copyrighted work of art must be original, and created independently
by the artist.by the artist. The law curbs this right, making it last only for a set time period.The law curbs this right, making it last only for a set time period. It also permits reproduction of portions of copyrighted work for limited It also permits reproduction of portions of copyrighted work for limited
work such as criticism or classroom instruction.work such as criticism or classroom instruction. Visit Visit http://www.copyright.govhttp://www.copyright.gov
ISAT 615 6
ISAT 615 7
Ten Commandments Of Computer EthicsTen Commandments Of Computer EthicsCreated by the Computer Ethics InstituteCreated by the Computer Ethics Institute
1.Thou Shalt Not Use A Computer To Harm Other People.1.Thou Shalt Not Use A Computer To Harm Other People. 2.Thou Shalt Not Interfere With Other People’s Computer 2.Thou Shalt Not Interfere With Other People’s Computer
Work.Work. 3.Thou Shalt Not Snoop Around In Other People’s 3.Thou Shalt Not Snoop Around In Other People’s
Computer Files.Computer Files. 4.Thou Shalt Not Use A Computer To Steal.4.Thou Shalt Not Use A Computer To Steal. 5.Thou Shalt Not Use A Computer To Bear False Witness.5.Thou Shalt Not Use A Computer To Bear False Witness. 6.Thou Shalt Not Copy Or Use Proprietary Software For 6.Thou Shalt Not Copy Or Use Proprietary Software For
Which You have Not Paid.Which You have Not Paid. 7.Thou Shalt Not Use Other People’s Computer Resources 7.Thou Shalt Not Use Other People’s Computer Resources
Without Authorization Or Proper Compensation.Without Authorization Or Proper Compensation.
ISAT 615 8
Ten Commandments Of Computer EthicsTen Commandments Of Computer EthicsContinuedContinued
8.Thou Shalt Not Appropriate Other People’s Intellectual 8.Thou Shalt Not Appropriate Other People’s Intellectual Output.Output.
9.Thou Shalt Think About The Social Consequences Of 9.Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are The Program You Are Writing Or The System You Are Designing.Designing.
10.Thou Shalt Always Use A Computer In Ways That 10.Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Insure Consideration And Respect For Your Fellow Humans.Humans.
http://www.brook.edu/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htmhttp://www.brook.edu/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htm
ISAT 615 9
ISAT 615 10
Workplace SurveillanceWorkplace Surveillance
90% of all companies with more than 1,000 employees 90% of all companies with more than 1,000 employees currently use e-mail.currently use e-mail.
Sixty billion messages are sent annually.Sixty billion messages are sent annually. Employees are under the impression that their messages Employees are under the impression that their messages
are private.are private. Old and deleted messages are archived and easily Old and deleted messages are archived and easily
accessible by the management.accessible by the management. In the US there is no comprehensive, uniform legal In the US there is no comprehensive, uniform legal
standard protecting privacy.standard protecting privacy. http://www.PrivacyExchange.orghttp://www.PrivacyExchange.org
ISAT 615 11
ISAT 615 12
Interesting QuotesInteresting Quotes
I find the information age to be a healthy thing…the more I find the information age to be a healthy thing…the more you know about somebody else, the better off everybody you know about somebody else, the better off everybody is.is.
Owner of personal database companyOwner of personal database company
There is the possibility of becoming an even more satisfied There is the possibility of becoming an even more satisfied society based on unequal access to information in which society based on unequal access to information in which individuals live in glass houses, while the external walls of individuals live in glass houses, while the external walls of large corporations are one-way mirrors.large corporations are one-way mirrors.
Gary T. Marx, Professor of Sociology, MITGary T. Marx, Professor of Sociology, MIT
ISAT 615 13
Government Regulation Vs. Industry Government Regulation Vs. Industry Self-PolicingSelf-Policing
In 1998, several major companies such as, IBM, HP, AOL In 1998, several major companies such as, IBM, HP, AOL and MS formed the Online Privacy Alliance (OPA).and MS formed the Online Privacy Alliance (OPA).
The Website is:The Website is: http://www.privacyalliance.comhttp://www.privacyalliance.com The AOL incident in 1998 stepped up the self-policing on The AOL incident in 1998 stepped up the self-policing on
the part of businesses to protect themselves against the part of businesses to protect themselves against lawsuits.lawsuits.
It has forced AOL to revise its privacy policy in 1999.It has forced AOL to revise its privacy policy in 1999. MS and IBM announced that their companies would pull MS and IBM announced that their companies would pull
their advertising from Websites that failed to post privacy their advertising from Websites that failed to post privacy policies in sync with their own.policies in sync with their own.
ISAT 615 14
ISAT 615 15
What Cyberspace Knows About YouWhat Cyberspace Knows About You
If you go to If you go to http://www.cdt.orghttp://www.cdt.org you will learn how much you will learn how much government and employers can discover about you.government and employers can discover about you.
Go to Go to http://www.aclu.org/privacyhttp://www.aclu.org/privacy and and you will find that a you will find that a lot of information about you could be available to anyone.lot of information about you could be available to anyone.
Spy Technology has become increasingly sophisticated, Spy Technology has become increasingly sophisticated, check out some of the sites that retail surveillance check out some of the sites that retail surveillance technology:technology:
http://www.intercept-spytech.comhttp://www.intercept-spytech.com
http://eaglevision1.comhttp://eaglevision1.com
ISAT 615 16
ISAT 615 17
ISAT 615 18
ISAT 615 19
ISAT 615 20
Big Brother in CyberspaceBig Brother in Cyberspace
The government is doing its part in educating Internet The government is doing its part in educating Internet users especially our most valuable asset, our kids.users especially our most valuable asset, our kids.
Go to:Go to:
http://www.cybercrime.gov/links1.htmhttp://www.cybercrime.gov/links1.htm
and select the following link:and select the following link:
Safety Tips for Kids on the Internet from the Federal BureaSafety Tips for Kids on the Internet from the Federal Bureau of Investigationu of Investigation
This is a hyperlink to the following:This is a hyperlink to the following:http://www.fbi.gov/publications/pguide/pguidee.htmhttp://www.fbi.gov/publications/pguide/pguidee.htm
ISAT 615 21
ISAT 615 22
ISAT 615 23
Medical PrivacyMedical Privacy In his book, In his book, The Limits of Privacy, The Limits of Privacy, Amitai Etzioni says “Amitai Etzioni says “it’s it’s
Big Bucks we need to worry about, not Big government.Big Bucks we need to worry about, not Big government.”” Etzioni continues that in 1996, 35% of the Fortune 500 Etzioni continues that in 1996, 35% of the Fortune 500
companies acknowledged that they draw on personal companies acknowledged that they draw on personal health information in making employment decisions.health information in making employment decisions.
These companies employ millions of people.These companies employ millions of people. Kathleen A. Frawley, VP of the American Health Info. Kathleen A. Frawley, VP of the American Health Info.
Mgmt. Assoc. says “Mgmt. Assoc. says “There is a whole market of people buying and There is a whole market of people buying and selling medical information.selling medical information.””
A.G. Breitenstein, Health Law Institute Director, said, A.G. Breitenstein, Health Law Institute Director, said, ““People are not going to go to feel comfortable going to the doctor, b/c People are not going to go to feel comfortable going to the doctor, b/c now you are going to have a permanent record that will follow you now you are going to have a permanent record that will follow you around for the rest of your life that says you have syphilis, or around for the rest of your life that says you have syphilis, or depression, or an abortion or whatever else.” depression, or an abortion or whatever else.”
ISAT 615 24
The Library Bills of RightsThe Library Bills of Rights
I.I. Books and other library resources should be provided for the interest, Books and other library resources should be provided for the interest, information, and enlightenment of all people of the community the library information, and enlightenment of all people of the community the library serves. Materials should not be excluded because of the origin, background, serves. Materials should not be excluded because of the origin, background, or views of those contributing to their creation.or views of those contributing to their creation.
II.II. Libraries should provide materials and information presenting all points of Libraries should provide materials and information presenting all points of view on current and historical issues. Materials should not be proscribed or view on current and historical issues. Materials should not be proscribed or removed because of partisan or doctrinal disapproval.removed because of partisan or doctrinal disapproval.
III.III. Libraries should challenge censorship in the fulfillment of their responsibility to Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment.provide information and enlightenment.
IV.IV. Libraries should cooperate with all persons and groups concerned with Libraries should cooperate with all persons and groups concerned with resisting abridgment of free expression and free access to ideas.resisting abridgment of free expression and free access to ideas.
V.V. A person’s right to use a library should not be denied or abridged because of A person’s right to use a library should not be denied or abridged because of origin, age, background, or views.origin, age, background, or views.
VI.VI. Libraries which make exhibit spaces and meeting rooms available to the Libraries which make exhibit spaces and meeting rooms available to the public they serve should make such facilities available on an equitable basis, public they serve should make such facilities available on an equitable basis, regardless of the beliefs or affiliations of individuals or groups requesting their regardless of the beliefs or affiliations of individuals or groups requesting their use.use.
ISAT 615 25
ISAT 615 26
QuestionsQuestions
Should children be protected from offensive Should children be protected from offensive online speech? Should adults?online speech? Should adults?
Who should do the protecting: Government? Who should do the protecting: Government? Schools? Public Libraries? Parents?Schools? Public Libraries? Parents?
ISAT 615 27
Internet AnonymityInternet Anonymity
In 1997, in ACLU v. Reno the supreme court noted that the In 1997, in ACLU v. Reno the supreme court noted that the Internet “Internet “provides relatively unlimited low-cost capacity for provides relatively unlimited low-cost capacity for communication of all kinds. This dynamic, multifaceted communication of all kinds. This dynamic, multifaceted category of communication includes not only traditional category of communication includes not only traditional print and news service, but also audio, video, and still print and news service, but also audio, video, and still images, as well as interactive, real-time dialogue. Through images, as well as interactive, real-time dialogue. Through the use of chat rooms, any person with a phone line can the use of chat rooms, any person with a phone line can become a town crier with a voice that resonates farther become a town crier with a voice that resonates farther than it could from any soapbox. Through the use of Web than it could from any soapbox. Through the use of Web pages, mail exploders, and newsgroups, the same pages, mail exploders, and newsgroups, the same individual can become pamphleteer.”individual can become pamphleteer.”
ISAT 615 28
Internet Anonymity Cont’d.Internet Anonymity Cont’d.
The Supreme Court goes on to say, “The Supreme Court goes on to say, “Anonymity is Anonymity is a shield from the tyranny of the majority. …It thus a shield from the tyranny of the majority. …It thus exemplifies the purpose behind the Bill of Rights, exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect and of the First Amendment in particular: to protect unpopular individuals from retaliation– and their unpopular individuals from retaliation– and their ideas from suppression– at the hand of an ideas from suppression– at the hand of an intolerant society.” intolerant society.”
What do you think about the Supreme Court’s What do you think about the Supreme Court’s stance?stance?
ISAT 615 29
Democracy and the InternetDemocracy and the Internet
I’m very optimistic about the role of human beings in the Information I’m very optimistic about the role of human beings in the Information Age, because this is an era where people – their knowledge, and their Age, because this is an era where people – their knowledge, and their ability to put that knowledge to work – will be more important than ever ability to put that knowledge to work – will be more important than ever before. … The Information Age is enabling people who were previoulsy before. … The Information Age is enabling people who were previoulsy forced to pursue a single means of wealth creation –those, for forced to pursue a single means of wealth creation –those, for example, who lived in remote areas had no option but to work on the example, who lived in remote areas had no option but to work on the land – to choose from a far wide range of work. Technology such as land – to choose from a far wide range of work. Technology such as the PC; the Internet and cheap telecommunications have brought the PC; the Internet and cheap telecommunications have brought amazing mobility to the factors of production.”amazing mobility to the factors of production.”
Bill Gates, 1999Bill Gates, 1999 What about non-democratic countries?What about non-democratic countries?
ISAT 615 30
Ethics and ProfessionalismEthics and Professionalism
““Engineers shall hold paramount the safety, health and Engineers shall hold paramount the safety, health and welfare of the public in the performance of their welfare of the public in the performance of their professional duties.”professional duties.”
Accreditation Board for Engineering and Technology (ABET)Accreditation Board for Engineering and Technology (ABET)
http://www.abet.org/http://www.abet.org/ Websites for general resources on Engineering Ethics:Websites for general resources on Engineering Ethics:
1.1. http://www.niee.orghttp://www.niee.org “National Institute for Engineering Ethics” “National Institute for Engineering Ethics”
2.2. http://www.nspe.orghttp://www.nspe.org “National Society of Professional Engineers” “National Society of Professional Engineers”
3.3. http://www.onlineethics.org/http://www.onlineethics.org/ “The online Ethics Center for “The online Ethics Center for Engineering and Science”Engineering and Science”
ISAT 615 31
ReferencesReferences
Ingulli, Halbert, Cyber Ethics, West Thomas Ingulli, Halbert, Cyber Ethics, West Thomas Learning, 2002Learning, 2002
Martin, Mike W., Schinzinger, Roland, Ethics Martin, Mike W., Schinzinger, Roland, Ethics in Engineering, Fourth Edition, McGraw Hill, in Engineering, Fourth Edition, McGraw Hill, 20052005